HIT Consultant Insightful coverage of healthcare innovation
 

systems

Results 376 - 400 of 3882Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Jul 17, 2015
With XenApp, It can mobilize business.
Tags : 
application delivery, platform, architecture, security device optimization, cloud
    
Citrix Systems
Published By: Citrix Systems     Published Date: Sep 17, 2015
Citrix XenApp delivers Windows apps as secure mobile services. With XenApp, IT can mobilize the business - increasing user productivity, while reducing costs by centralizing control and security of intellectual property.
Tags : 
citrix, xenapp, security, windows, app virtualization
    
Citrix Systems
Published By: Riverbed     Published Date: Oct 17, 2012
As your business needs become more dynamic, monitoring systems will be key to understanding how applications fulfill business needs. With complexity growing at a fast rate, application discovery and mapping will soon be mandatory.
Tags : 
riverbed, application visibility, infrastructure monitoring, it infrastructure
    
Riverbed
Published By: Apstra     Published Date: Feb 21, 2019
When Bloomberg Television opened its state-of-the-art broadcast facility in the companyís new European Headquarters in London last year, network engineers from the companyís IT infrastructure team collaborated with Apstra to successfully pilot its technology in order to gain visibility across and more effectively manage the network fabric supporting the buildingís media production systems.
Tags : 
apstra, bloomberg, network engineering
    
Apstra
Published By: IBM     Published Date: Mar 05, 2014
For many years, companies have been building data warehouses to analyze business activity and produce insights for decision makers to act on to improve business performance. These traditional analytical systems are often based on a classic pattern where data from multiple operational systems is captured, cleaned, transformed and integrated before loading it into a data warehouse. Typically, a history of business activity is built up over a number of years allowing organizations to use business intelligence (BI) tools to analyze, compare and report on business performance over time. In addition, subsets of this data are often extracted from data warehouses into data marts that have been optimized for more detailed multi-dimensional analysis.
Tags : 
ibm, big data, data, big data platform, analytics, data sources, data complexity, data volume, data generation, data management, storage, acceleration, business intelligence, data warehouse
    
IBM
Published By: IBM     Published Date: May 02, 2014
These traditional analytical systems are often based on a classic pattern where data from multiple operational systems is captured, cleaned, transformed and integrated before loading it into a data warehouse.
Tags : 
ibm, big data platform, architecting big data, analytics, intelligent business strategies, data complexity, data types, workload growth, workload complexity, big data analytic applications, operational decisions, multi-structured data, querying data, scalable data management, analytical ecosystem, hadoop solutions
    
IBM
Published By: MuleSoft     Published Date: Jan 25, 2016
IT used to be so simple. Companies owned their own technology equipment and purchased enterprise licenses for many of the applications anybody in the organization might care to use. But then the cloud emerged, and mobile, and social media, and IoT; the world of IT has never been the same. Today's businesses are software-driven enterprises with technology capability distributed throughout the company, utilizing countless third-party cloud-based applications. This new organization requires an cultural shift in the IT organization. Read this whitepaper to learn: -How businesses can reorganize themselves into lightweight, agile, modular businesses able to respond to innovations in SaaS, mobile, and analytics -How to build a technological architecture that can accommodate new technology yet still extract value from on-premises systems -The advantages of an API-led connected architecture vs. old SOA approaches
Tags : 
technology, enterprise applications, best practices, business optimization, technology architecture
    
MuleSoft
Published By: IBM     Published Date: Jul 20, 2016
In this Webinar, you will learn: - How Today's Environments Push The Limits Of Current Infrastructure - Why Performance And Mixed Workloads Require A More Powerful Operating Ecosystem - Key Recommendations and insights to improve architecture infrastructure performance and flexibility
Tags : 
ibm, hardware, systems hardware, linux, linux on power
    
IBM
Published By: GE Healthcare     Published Date: Jun 09, 2015
Medical providers and facilities maintain diverse imaging systems that make management, storage and retrieval challenging. Vendor-neutral archives can address the challenges with central storage facilities, a common interface and simplified access. Learn more in this whitepaper.
Tags : 
imaging systems, vendor-neutral archives, central storage facilities, vna, pacs, healthcare organizations, data management, information technology, document imaging, electronic health records, enterprise content management
    
GE Healthcare
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus, spam, viruses, trojans, rootkits, malware, threats, eset, nod32, trends, security, networks, spyware
    
ESET
Published By: Mimecast     Published Date: Dec 20, 2018
Over the last few years government agencies have been concerned with protection of personal data and consequences of data breaches on business and citizens. Thatís driven businesses to look how rules and regulations can help guide organizations to build systems and processes that protect peoples data. Watch now to learn more.
Tags : 
    
Mimecast
Published By: Riverbed     Published Date: Feb 26, 2015
Hospitals and healthcare providers are united under one central mission: to provide exceptional care to patients while keeping costs down. Increasingly, thatís being accomplished through technology, and healthcare providers are becoming incredibly dependent on IT for their day-to-day operations.
Tags : 
healthcare, daily operations, health record system, practice management, coding software, health statistics, prescribing systems, healthcare providers
    
Riverbed
Published By: webmechanix     Published Date: Mar 06, 2014
Sadly, many companies arenít. Thatís why we created this free, online assessment to help you understand the COSO framework more intimately. Answer just 17 multiple choice questions (100% confidentiality guaranteed) & get instant feedback that highlights important flaws in your current systems & point you in the right direction. Donít get caught with your pants down. Take a few minutes right now to gain understanding of key organizational vulnerabilities regarding the new COSO framework & stay ahead of the pack.
Tags : 
coso assessment, coso framework, coso guidelines
    
webmechanix
Published By: BlackBerry     Published Date: Oct 03, 2012
Get the details on how BlackBerry Mobile Fusion can make managing mobile devices - including those running Apple iOS and Google Android operating systems faster, easier and safer than ever.
Tags : 
byod, bring your own device, blackberry, mobile device, managing mobility, managing enterprise mobility, smartphones, mobile device management
    
BlackBerry
Published By: AuditBoard     Published Date: Nov 26, 2018
When the IASB and FASB issued a joint press release on May 28, 2014 1 announcing new revenue recognition standards for revenue from contracts with customers, the adoption deadline seemed a long way off. After pushback from companies across various industries, the implementation date was extended by one year, granting companies more time to update their policies and systems to adhere to the new standards.
Tags : 
    
AuditBoard
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Organizations today depend upon their networks to increase productivity and reduce network infrastructure and maintenance costs. Accordingly, these networks must be secure and perform reliably in order to accommodate geographically dispersed users. Unplanned remote site downtime due to equipment failure or adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 15, 2009
ASG's Business Service Portfolio (BSP) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: Singapore Economic Development Board     Published Date: Nov 14, 2018
Asia is well positioned to continue its role as an innovation incubator and an important market for new products and services. Harvard Business Review articulates how the three key factors of People, Policies and Resources contribute to Asiaís innovation ecosystems, and shares how companies like Intel, Micron, Medtronic have been innovating for Asia from Singapore.
Tags : 
    
Singapore Economic Development Board
Published By: HP     Published Date: Mar 31, 2015
When was the last time you thought about your disaster recovery plan? Natural disasters, such as earthquakes, tsunamis, hurricanes, fires, or floods can occur anytime and disable your data center, with little to no warning. Hacker activities like a denial of service attack can also take down your systems unexpectedly. Then you have the more mundane risks such as human error and hardware or software failures. The only predictable thing to say about these risks is that at some point, on some scale, youíll have to recover your data center from downtime. When it comes to disaster readiness, proactive planning is the key to success. Every business, regardless of size, needs to have a well-tested disaster recovery plan in place. Every minute your systems are down, the financial implications grow. Take the assessment to see where your disaster recovery plan ranks. Then learn about next steps and more information.
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness
    
HP
Published By: Cisco     Published Date: Dec 21, 2016
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Tags : 
    
Cisco
Published By: HP Data Center     Published Date: Feb 18, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained. This invariably leads to facility infrastructure problems such as thermal “hot spots”, lack of UPS (uninterruptible power supply) rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that when properly designed, built and operated, are an integral part of the business strategy driving the success of any enterprise, yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems, with little thought given to the structure and space in which it is to be housed, serviced and maintained. This invariably leads to facility infrastructure problems, such as thermal hot spots, lack of UPS, rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : 
hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
    
HP Data Center
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.